The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html - | |
References | () http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html - | |
References | () http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html - | |
References | () http://www.securityfocus.com/archive/1/408603/30/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/444424/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/444501/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/444737/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19726 - |
Information
Published : 2006-08-29 00:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4430
Mitre link : CVE-2006-4430
CVE.ORG link : CVE-2006-4430
JSON object : View
Products Affected
cisco
- network_admission_control
- network_admission_control_manager_and_server_system_software
CWE